Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Cryptography and competition policy: issues with “trusted computing”
Anderson R.  Principles of distributed computing (Proceedings of the twenty-second annual symposium, Boston, Massachusetts, Jul 13-16, 2003)3-10.2003.Type:Proceedings
Date Reviewed: Jan 5 2004

This paper is predominantly a comment on Microsoft’s Palladium project, although it also comments on TC. (TC has several meanings--trusted computing, treacherous computing, and trustworthy computing--and the choice of meaning is left to the reader.)

The term “trusted” has its roots in the June 2002 Microsoft announcement of Palladium, a version of Windows due for release in 2004. Palladium was built upon the work of the Trusted Computing Platform Alliance (TCPA), including Microsoft, Intel, IBM, and HP, which published an ignored specification in 2000. Now, TCPA has evolved into the Trusted Computing Group, referred to as TCPA/TCG in the paper. Palladium has been renamed to Next Generation Secure Computing Base (NGSCB). According to Microsoft, “trusted” means that software running on a PC can be trusted by third parties, who can verify that a program running on a machine with which they are communicating has not been modified by the machine’s owner.

The paper is divided into eight sections: “Introduction,” “Trusted Computing,” “Value to Corporate and Government Users,” “Value to Content Owners,” “Value to Hardware Vendors,” “Value to Software Vendors,” “Conclusion and Scope for Future Work,” and (valuable) “References.” In order to arrive at a consistent and robust policy direction on TC, the author asserts that there is a need for tests that show whether consumers end up better or worse off with TC. Scenarios in the paper assert that values can be attributed to organizations and not individual consumers.

Reviewer:  J. Fendrich Review #: CR128839 (0405-0606)
Bookmark and Share
 
Cryptographic Controls (D.4.6 ... )
 
 
Distributed Systems (H.3.4 ... )
 
 
Ethical Dilemmas (K.7.4 ... )
 
 
Markets (K.1 ... )
 
 
Pricing And Resource Allocation (K.6.2 ... )
 
 
Regulation (K.5.2 ... )
 
 
Security (K.4.4 ... )
 
 
Standards (K.1 ... )
 
 
Electronic Commerce (K.4.4 )
 
 
Governmental Issues (K.5.2 )
 
 
Hardware/ Software Protection (K.5.1 )
 
 
Installation Management (K.6.2 )
 
 
Professional Ethics (K.7.4 )
 
 
Systems And Software (H.3.4 )
 
Would you recommend this review?
yes
no
Other reviews under "Cryptographic Controls": Date
Cryptology: machines, history and methods
Deavours C., Kahn D., Kruh L., Mellen G. (ed), Winkel B. (ed) Artech House, Inc., Norwood, MA,1989. Type: Divisible Book
Jan 1 1992
Transaction security system
Abraham D., Dolan G., Double G., Stevens J. (ed) IBM Systems Journal 30(2): 206-229, 1991. Type: Article
Mar 1 1992
Cryptography for computer security: making the decision
Fisher W. Computers and Security 3(3): 229-233, 1984. Type: Article
Jun 1 1985
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy